Zobrazeno 1 - 10
of 2 322
pro vyhledávání: '"WAGNER, ERIC"'
While anonymity networks such as Tor provide invaluable privacy guarantees to society, they also enable all kinds of criminal activities. Consequently, many blameless citizens shy away from protecting their privacy using such technology for the fear
Externí odkaz:
http://arxiv.org/abs/2412.00990
With the escalating threats posed by cyberattacks on Industrial Control Systems (ICSs), the development of customized Industrial Intrusion Detection Systems (IIDSs) received significant attention in research. While existing literature proposes effect
Externí odkaz:
http://arxiv.org/abs/2403.01809
Aggregation of message authentication codes (MACs) is a proven and efficient method to preserve valuable bandwidth in resource-constrained environments: Instead of appending a long authentication tag to each message, the integrity protection of multi
Externí odkaz:
http://arxiv.org/abs/2312.09660
Industrial control systems increasingly rely on middlebox functionality such as intrusion detection or in-network processing. However, traditional end-to-end security protocols interfere with the necessary access to in-flight data. While recent work
Externí odkaz:
http://arxiv.org/abs/2312.09650
Autor:
Lamberts, Olav, Wolsing, Konrad, Wagner, Eric, Pennekamp, Jan, Bauer, Jan, Wehrle, Klaus, Henze, Martin
Publikováno v:
Journal of Systems Research (JSys) Volume 3(1) 2023
Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its critica
Externí odkaz:
http://arxiv.org/abs/2311.02929
Autor:
Pennekamp, Jan, Matzutt, Roman, Klinkmüller, Christopher, Bader, Lennart, Serror, Martin, Wagner, Eric, Malik, Sidra, Spiß, Maria, Rahn, Jessica, Gürpinar, Tan, Vlad, Eduard, Leemans, Sander J. J., Kanhere, Salil S., Stich, Volker, Wehrle, Klaus
Publikováno v:
ACM Computing Surveys 56(2):1-38, 2024
Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studie
Externí odkaz:
http://arxiv.org/abs/2401.01022
A large sample of active-region-targeted time-series images from the Solar Dynamics Observatory / Atmospheric Imaging Assembly, the AIA Active Region Patch database ("AARPs", Paper I: Dissauer et al 2022) is used to investigate whether parameters des
Externí odkaz:
http://arxiv.org/abs/2212.11255
We begin here a series of papers examining the chromospheric and coronal properties of solar active regions. This first paper describes an extensive dataset of images from the Atmospheric Imaging Assembly on the Solar Dynamics Observatory curated for
Externí odkaz:
http://arxiv.org/abs/2212.11251